logo

Assignment on Software Engineering

16 Pages3652 Words74 Views
   

Added on  2020-04-21

Assignment on Software Engineering

   Added on 2020-04-21

ShareRelated Documents
SOFTWARE ENGINEERING1
SOFTWARE ENGINEERING
Name of the Student
Name of the University
Author Note
Assignment on Software Engineering_1
SOFTWARE ENGINEERING2
Table of Contents
Introduction................................................................................................................................3
Importance of system safety.......................................................................................................3
Safety critical activity................................................................................................................4
Activity 1: Develop a primary hazard list..................................................................................4
Implications followed by software development team..............................................................5
Use Case - software development as an application..................................................................8
Software model..........................................................................................................................8
Attack.......................................................................................................................................11
Services to comprehend the LDAP injection...........................................................................12
Prevent LDAP Injection with Veracode..................................................................................13
Types of attack.........................................................................................................................13
Conclusion................................................................................................................................14
Bibliography.............................................................................................................................15
Assignment on Software Engineering_2
SOFTWARE ENGINEERING3
Introduction
Since the implementation of the digital computers, system safety practitioners have
been very much concerned with the implementation of the computers performing safety. In
the early age, engineers and programmers restricted themselves from performing in high risk
and hazardous operation where the intervention of human was nearly deemed1. The branch of
engineering which deals with the development of the software is known as software
engineering. This is done using specific science principles, procedures and methods. The
basic outcome of the process is an efficient and reliable software product.
The main aim of the report is to take into consideration there different life cycles
models of which two describes the security issue, which is involved in it. The risk factors,
which are associated with the process, is taken in to consideration. The threat assessment is
done for a particular task with it a taxonomy of attacks are taken into consideration.
Importance of system safety
Failure of a system to perform function which is intended to be performed by the system
The software performs the function that is not required at that time.
The software possesses sequential problem and timing
The software possesses timing or problem, which is sequential i.e. failing to ensure that
mainly two things can happen at the same time at different places or in a particular order.
2.
The common factors, which are associated with the software falling, are as follows:
1 SearchSecurity, 'Security In The Software Development Life Cycle' (SearchSecurity, 2017)
<http://searchsecurity.techtarget.com/tip/Security-in-the-software-development-life-cycle> accessed 8
November 2017.
2 Insights.sei.cmu.edu, 'The SPRUCE Series: Recommended Practices In The Software Development
Of Safety-Critical Systems' (Insights.sei.cmu.edu, 2017) <https://insights.sei.cmu.edu/sei_blog/2015/06/the-
spruce-series-recommended-practices-in-the-software-development-of-safety-critical-systems.html> accessed 8
November 2017.
Assignment on Software Engineering_3
SOFTWARE ENGINEERING4
Specification error: specification error mainly includes improper statement, omitted code,
incorrect specification and their requirement.
Design and coding error: these errors are mainly understood by the programmers and can
directly result from the error in the specification. This is mainly caused due to poor
structure in the technique with aspect to the code.
Hardware /computer included error: this error is not so common error as taking into
account other errors. This error mainly includes random power supply transients,
computer function that mainly transform one or more bit in the computer word that
intentionally change the meaning of the software instruction.
Safety critical activity
Activity 1: Develop a primary hazard list
The primary hazard list (PHL) is mainly generated at the start of each of the analysis,
which is related to the hazardous activity. It can be considered as a list of anything that can
be directly analysed that can be thought of anything which can go wrong. It provides a list of
hazards that are associated with the concept, which is under consideration. The contract can
be taken to be under consideration to involve investigation of future selected hazardous c
characteristics, which are identified by the PHL to determine their main significance. This
can be used in making series decision, which can range from “should the program continue”
to the concept of shaping the post contractual requirement related to safety. Either the host
employee or a contactor may generate the PHL. 3
3 Doss, Osama, and Tim P. Kelly. "Challenges and Opportunities in Agile Development in Safety
Critical Systems: A Survey." ACM SIGSOFT Software Engineering Notes 41.2 (2016): 30-31.
Assignment on Software Engineering_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Introduction to Kali Linux
|18
|683
|42

Object-Oriented Software Design in Java
|6
|1399
|79

Ransomware Attack and its Impact
|13
|2416
|74

Therac-25 Case Study
|4
|951
|442

Web Application Pentesting
|13
|3328
|55

Penetration Testing Report And Management
|12
|2862
|10